diff --git a/2017/10xxx/CVE-2017-10940.json b/2017/10xxx/CVE-2017-10940.json index 64e15530420..1fc406a2d8c 100644 --- a/2017/10xxx/CVE-2017-10940.json +++ b/2017/10xxx/CVE-2017-10940.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10940", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Joyent Smart Data Center", + "version" : { + "version_data" : [ + { + "version_value" : "prior to agentsshar@1.0.0-release-20160901-20160901T051624Z-g3fd5adf (e469cf49-4de3-4658-8419-ab42837916ad)" + } + ] + } + } + ] + }, + "vendor_name" : "Joyent" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Joyent Smart Data Center prior to agentsshar@1.0.0-release-20160901-20160901T051624Z-g3fd5adf (e469cf49-4de3-4658-8419-ab42837916ad). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the docker API. The process does not properly validate user-supplied data which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute arbitrary code under the context of root. Was ZDI-CAN-3853." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-22-Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://help.joyent.com/hc/en-us/articles/115009649927-Security-Advisory-ZDI-CAN-3853-Docker-File-Overwrite-Vulnerability" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-453" } ] } diff --git a/2017/10xxx/CVE-2017-10941.json b/2017/10xxx/CVE-2017-10941.json index 32b3b253903..3a6870a02e9 100644 --- a/2017/10xxx/CVE-2017-10941.json +++ b/2017/10xxx/CVE-2017-10941.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10941", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.3.0.14878" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.0.14878. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the AFParseDateEx function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4816." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-416-Use After Free" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-454" } ] } diff --git a/2017/10xxx/CVE-2017-10942.json b/2017/10xxx/CVE-2017-10942.json index 9dae2fa439c..cb252e9bc66 100644 --- a/2017/10xxx/CVE-2017-10942.json +++ b/2017/10xxx/CVE-2017-10942.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10942", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.3.0.14878" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.0.14878. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-4737." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-125-Out-of-bounds Read" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-455" } ] } diff --git a/2017/10xxx/CVE-2017-10943.json b/2017/10xxx/CVE-2017-10943.json index b630930b69f..c61f3d0e529 100644 --- a/2017/10xxx/CVE-2017-10943.json +++ b/2017/10xxx/CVE-2017-10943.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10943", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.3.0.14878" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.0.14878. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-4738." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-125-Out-of-bounds Read" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-456" } ] } diff --git a/2017/10xxx/CVE-2017-10944.json b/2017/10xxx/CVE-2017-10944.json index 96d4a671e89..3a16b533ad1 100644 --- a/2017/10xxx/CVE-2017-10944.json +++ b/2017/10xxx/CVE-2017-10944.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10944", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.3.0.14878" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.0.14878. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ObjStm objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-4846." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-125-Out-of-bounds Read" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-457" } ] } diff --git a/2017/10xxx/CVE-2017-10945.json b/2017/10xxx/CVE-2017-10945.json index 2a3a530f68e..1d2c4f86991 100644 --- a/2017/10xxx/CVE-2017-10945.json +++ b/2017/10xxx/CVE-2017-10945.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10945", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.3.0.14878" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.0.14878. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the app.alert function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4855." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-416-Use After Free" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-458" } ] } diff --git a/2017/10xxx/CVE-2017-10946.json b/2017/10xxx/CVE-2017-10946.json index 1f18c20a02a..c9b21cb2fb7 100644 --- a/2017/10xxx/CVE-2017-10946.json +++ b/2017/10xxx/CVE-2017-10946.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10946", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.2.1.6871" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the setItem function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4721." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-416-Use After Free" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-459" } ] } diff --git a/2017/10xxx/CVE-2017-10947.json b/2017/10xxx/CVE-2017-10947.json index fb0aa80e53c..43432503adb 100644 --- a/2017/10xxx/CVE-2017-10947.json +++ b/2017/10xxx/CVE-2017-10947.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10947", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.2.1.6871" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the print function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4722." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-416-Use After Free" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-460" } ] } diff --git a/2017/10xxx/CVE-2017-10948.json b/2017/10xxx/CVE-2017-10948.json index 6eedb1aaf47..824a661582d 100644 --- a/2017/10xxx/CVE-2017-10948.json +++ b/2017/10xxx/CVE-2017-10948.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10948", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.2.1.6871" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the app.execMenuItem function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4723." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-416-Use After Free" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-461" } ] } diff --git a/2017/10xxx/CVE-2017-10953.json b/2017/10xxx/CVE-2017-10953.json index d11b047337a..e735435dbde 100644 --- a/2017/10xxx/CVE-2017-10953.json +++ b/2017/10xxx/CVE-2017-10953.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10953", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Foxit Reader", + "version" : { + "version_data" : [ + { + "version_value" : "8.3.0.14878" + } + ] + } + } + ] + }, + "vendor_name" : "Foxit" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.0.14878. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the gotoURL method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5030." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-78-Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + }, + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-718" } ] } diff --git a/2017/10xxx/CVE-2017-10954.json b/2017/10xxx/CVE-2017-10954.json index 4112f061866..062c40cf1e2 100644 --- a/2017/10xxx/CVE-2017-10954.json +++ b/2017/10xxx/CVE-2017-10954.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "zdi-disclosures@trendmicro.com", "ID" : "CVE-2017-10954", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Bitdefender Internet Security", + "version" : { + "version_data" : [ + { + "version_value" : "Internet Security 2018 prior to build 7.72918" + } + ] + } + } + ] + }, + "vendor_name" : "Bitdefender" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security Internet Security 2018 prior to build 7.72918. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within pdf.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-4361." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-190-Integer Overflow or Wraparound" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://zerodayinitiative.com/advisories/ZDI-17-717" } ] }